Communication Theory of Secrecy Systems*
DOI10.1002/J.1538-7305.1949.TB00928.XzbMATH Open1200.94005OpenAlexW2109394932WikidataQ1053345 ScholiaQ1053345MaRDI QIDQ3645296FDOQ3645296
Authors: Claude Shannon
Publication date: 17 November 2009
Published in: Bell System Technical Journal (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Recommendations
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Communication theory (94A05) Cryptography (94A60)
Cited In (only showing first 100 items - show all)
- On the fractional-order extended Kalman filter and its application to chaotic cryptography in noisy environment
- Stream/block ciphers, difference equations and algebraic attacks
- Involutory-multiple-lightweight MDS matrices based on Cauchy-type matrices
- A framework to optimize implementations of matrices
- A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
- Elements of randomized forecasting and its application to daily electrical load prediction in a regional power system
- Generative adversarial networks-based pseudo-random number generator for embedded processors
- On the optimality of quantum encryption schemes
- Data driven computing with noisy material data sets
- OAEP Is Secure under Key-Dependent Messages
- Public-key quantum digital signature scheme with one-time pad private-key
- Prospects of quantum-classical optimization for digital design
- Authenticated key agreement in dynamic peer groups
- Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
- Building blockcipher from small-block tweakable blockcipher
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Confidentiality and differential privacy in the dissemination of frequency tables
- Lightweight MDS generalized circulant matrices
- Error correcting codes, block designs, perfect secrecy and finite fields
- Entropy dimension reduction method for randomized machine learning problems
- Cellular automata based S-boxes
- Exploiting randomness on continuous sets
- A chaos-based approach to the design of cryptographically secure substitutions
- An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
- On integrating confidentiality and functionality in a formal method
- Ping-pong protocols as prefix grammars: modelling and verification via program transformation
- A chaos-based image encryption algorithm with variable control parameters
- An analysis of the blockcipher-based hash functions from PGV
- The combinatorics of authentication and secrecy codes
- Randomized half-ideal cipher on groups with applications to UC (a)PAKE
- Wavelet packet transform-based robust video watermarking technique
- Permutation polynomials modulo \(2^w\)
- On the impossibility of highly-efficient blockcipher-based hash functions
- CS-Cipher
- Some results onq-ary bent functions
- Quantum uncertainty and the spectra of symmetric operators
- Title not available (Why is that?)
- Chaotic image encryption design using Tompkins-Paige algorithm
- Substitution-permutation networks resistant to differential and linear cryptanalysis
- GLS coding based security solution to JPEG with the structure of aggregated compression and encryption
- Modified Baptista type chaotic cryptosystem via matrix secret key
- Entanglement and Entropic Uncertainty of Two Two‐Level Atoms
- Authentication codes and bipartite graphs
- A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks
- Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic
- On entropy, information inequalities, and groups
- Exposed-key weakness of \(\alpha \eta \)
- On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations
- Experimental realization of a highly secure chaos communication under strong channel noise
- A fast software one-way hash function
- Security risk during the transient in a key exchange protocol using random signals and feedback
- Cryptology: The mathematics of secure communication
- Polynomially complete quasigroups of prime order
- A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform
- A novel algorithm for image encryption based on couple chaotic systems
- Permutation and sampling with maximum length CA or pseudorandom number generation
- Not all (possibly) “random” sequences are created equal
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A new chaotic algorithm for image encryption
- A chaotic image encryption scheme owning temp-value feedback
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Robust quantum dialogue based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state
- Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
- Quantum authencryption with two-photon entangled states for off-line communicants
- A novel heuristic method for obtaining \(S\)-boxes
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- A construction of novel chaos base nonlinear component of block cipher
- Quantum dialogue protocols immune to collective noise
- Quantum key agreement against collective decoherence
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Nonlinearities of S-boxes
- Image encryption using DNA addition combining with chaotic maps
- Algebraic Cryptanalysis of the Data Encryption Standard
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- Differentially 4-uniform bijections by permuting the inverse function
- New field of cryptography: DNA cryptography
- An efficient quantum private comparison of equality over collective-noise channels
- Unconditionally secure quantum signatures
- Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation
- Image security system using recursive cellular automata substitution
- Algebraic nonlinearity and its applications to cryptography
- A construction of a cipher from a single pseudorandom permutation.
- Quantum correlation with entanglement and mutual entropy
- Comment on: ``Three-party quantum secure direct communication based on GHZ states
- Enumerating Boolean functions of cryptographic significance
- An image encryption scheme based on quantum logistic map
- Jarzynski-type equalities in gambling: role of information in capital growth
- Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- New bounds and constructions for authentication/secrecy codes with splitting
- Algebraic attacks using binary decision diagrams
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- Prediction, retrodiction, and the amount of information stored in the present
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Controlled bidirectional quantum secure direct communication with six-qubit entangled states
- Secret sharing over infinite domains
- A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)